![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.67917 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 14 FEDORA-2010-12386 (uzbl) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to uzbl announced via advisory FEDORA-2010-12386. Uzbl is a lightweight web browser based on WebKit/Gtk+. Uzbl follows the UNIX philosophy - Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface. Update Information: Fix a bug in the default configuration for the mouse bindings that can allow crafted links to execute arbitrary shell code. Please check your local configuration and replace \@SELECTED_URI with $8 in any string that is executed as shell code (usually involves sh 'commands_here'). References: [ 1 ] Bug #621964 - CVE-2010-2809 uzbl: malicious code execution via unsanitized @SELECTED_URI https://bugzilla.redhat.com/show_bug.cgi?id=621964 Solution: Apply the appropriate updates. This update can be installed with the yum update program. Use su -c 'yum update uzbl' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-12386 Risk factor : High CVSS Score: 6.8 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-2809 42297 http://www.securityfocus.com/bid/42297 [oss-security] 20100806 CVE request: uzbl before 2010.08.05: User-assisted execution of arbitrary commands caused by faulty default config http://marc.info/?l=oss-security&m=128111493509265&w=2 [oss-security] 20100806 Re: CVE request: uzbl before 2010.08.05: User-assisted execution of arbitrary commands caused by faulty default config http://marc.info/?l=oss-security&m=128111994317381&w=2 http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975 http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2 http://www.uzbl.org/bugs/index.php?do=details&task_id=240 http://www.uzbl.org/news.php?id=29 https://bugzilla.redhat.com/show_bug.cgi?id=621964 https://bugzilla.redhat.com/show_bug.cgi?id=621965 uzbl-atselecteduri-command-execution(61011) https://exchange.xforce.ibmcloud.com/vulnerabilities/61011 |
Copyright | Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |